[1] 陈宇峰,向郑涛,董亚波,等.车联网建模和统计性质分析及其路由策略综述[J].计算机应用,2015,35(12):3321-3324.(CHEN Y F, XIANG Z T, DONG Y B, et al. Review of modeling, statistical properties analysis and routing strategies optimization in Internet of vehicles[J]. Journal of Computer Applications, 2015, 35(12):3321-3324.) [2] LU R. Security and privacy preservation in vehicular social networks[D]. Waterloo:University of Waterloo, 2012:18-28. [3] WANG Y, XIA Y, HOU J, et al. A fast privacy-preserving framework for continuous location-based queries in road networks[J]. Journal of Network and Computer Applications, 2015, 53(7):57-73. [4] SONG D, PARK K. A privacy-preserving location-based system for continuous spatial queries[J/OL]. Mobile Information Systems, 2016, 2016:1-9[2016-09-25]. http://dx.doi.org/10.1155/2016/6182769. [5] KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for location-based services[C]//Proceeding of the 21st International Conference on Data Engineering Workshops. Piscataway, NJ:IEEE, 2005:88-97. [6] TRAN M T, ECHIZEN I, DUONG A D. Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services[C]//Proceedings of the 2010 International Conference on Availability, Reliability, and Security. Piscataway, NJ:IEEE, 2010:580-585. [7] HARA T, SUZUKI A, IWATA M, et al. Dummy-based user location anonymization under real-world constraints[J]. IEEE Access, 2016, 4:673-687. [8] LU R, LIN X, LUAN T H, et al. Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J]. IEEE Transactions on Vehicular Technology, 2012, 61(1):86-96. [9] YING B, MAKRAKIS D. Reputation-based pseudonym change for location privacy in vehicular networks[C]//Proceedings of the 2015 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2015:7041-7046. [10] YU R, KANG J, HUANG X, et al. MixGroup:accumulative pseudonym exchanging for location privacy preservation in vehicular social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(1):93-105. [11] HOH B, GRUTESER M. Protecting location privacy through path confusion[C]//Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway, NJ:IEEE, 2005:194-205. [12] MEYEROWITZ J, ROY CHOUDHURY R. Hiding stars with fireworks:location privacy through camouflage[C]//Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. New York:ACM, 2009:345-356. [13] MOURATIDIS K, YIU M L. Shortest path computation with no information leakage[J]. Proceedings of the VLDB Endowment, 2012, 5(8):692-703. [14] WANG L, MA R, MENG X. Evaluating k nearest neighbor query on road networks with no information leakage[C]//WISE 2015:Proceedings of the 16th International Conference on Web Information Systems Engineering. Berlin:Springer, 2015:508-521. [15] KHOSHGOZARAN A, SHIRANI-MEHR H, SHAHABI C. Blind evaluation of location based queries using space transformation to preserve location privacy[J]. GeoInformatica, 2013, 17(4):599-634. [16] 田丰,桂小林,张学军,等.基于兴趣点分布的外包空间数据隐私保护方法[J].计算机学报,2014,37(1):123-138.(TIAN F, GUI X L, ZHANG X J, et al. Privacy-preserving approach for outsourced spatial data based on POI distribution[J]. Chinese Journal of Computers, 2014, 37(1):123-138.) [17] 周长利,马春光,杨松涛.路网环境下保护LBS位置隐私的连续KNN查询方法[J].计算机研究与发展,2015,52(11):2628-2644.(ZHOU C L, MA C G, YANG S T. Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015, 52(11):2628-2644.) [18] PENG T, LIU Q, WANG G. Enhanced location privacy preserving scheme in location-based services[J]. IEEE Systems Journal, 2014, 11(1):219-230. [19] KATO R, IWATA M, HARA T, et al. User location anonymization method for wide distribution of dummies[C]//Proceedings of the 2013 International Conference on Database and Expert Systems Applications. Berlin:Springer, 2013:259-273. [20] ATAEI M, KRAY C. Ephemerality is the new black:a novel perspective on location data management and location privacy in LBS[M]//Progress in Location-Based Services 2016. Berlin:Springer, 2017:357-373. [21] SONG J H, WONG V W S, LEUNG V C M. Wireless location privacy protection in vehicular Ad-Hoc networks[J]. Mobile Networks and Applications, 2010, 15(1):160-171. [22] HUANG L, MATSUURA K, YAMANE H, et al. Enhancing wireless location privacy using silent period[C]//Proceedings of the 2005 Wireless Communications and Networking Conference. Piscataway, NJ:IEEE, 2005:1187-1192. [23] SAMPIGETHAYA K, LI M, HUANG L, et al. AMOEBA:robust location privacy scheme for VANET[J]. IEEE Journal on Selected Areas in Communications, 2007, 25(8):1569-1589. [24] BUTTYÁN L, HOLCZER T, WEIMERSKIRCH A, et al. SLOW:a practical pseudonym changing scheme for location privacy in VANETs[C]//Proceedings of the 2009 Vehicular Networking Conference. Piscataway, NJ:IEEE, 2009:1-8. [25] SCHEUER F, FUCHS K P, FEDERRATH H. A safety-preserving mix zone for VANETs[M]//Trust, Privacy and Security in Digital Business. Berlin:Springer, 2011:37-48. [26] PALANISAMY B, LIU L. MobiMix:protecting location privacy with mix-zones over road networks[C]//Proceedings of the 2011 International Conference on Data Engineering. Piscataway, NJ:IEEE, 2011:494-505. [27] LIU X, ZHAO H, PAN M, et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]//Proceedings of the 31st Annual IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2012:972-980. [28] PALANISAMY B, LIU L, LEE K, et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks[J]. Distributed and Parallel Databases, 2014, 32(1):91-118. [29] CHOR B, KUSHILEVITZ E, GOLDREICH O, et al. Private information retrieval[J]. Journal of the ACM, 1998, 45(6):965-981. [30] WU D J, ZIMMERMAN J, PLANUL J, et al. Privacy-preserving shortest path computation[EB/OL]. (2016-01-10)[2017-01-25]. http://arxiv.org/abs/1601.02281. [31] GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services:anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2008:121-132. [32] PAPADOPOULOS S, BAKIRAS S, PAPADIAS D. Nearest neighbor search with strong location privacy[J]. Proceedings of the VLDB Endowment, 2010, 3(1/2):619-629. [33] KHOSHGOZARAN A, SHAHABI C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]//Proceedings of the 2007 International Symposium on Spatial and Temporal Databases. Berlin:Springer, 2007:239-257. |